Michael Wesler

Executive Summary:

One of the most infamous “hacktivist” organizations is called “Anonymous.” This organization hacked many companies and many accounts. “Anonymous” released 40,000 individual account users' information on rootkit.com. This information came from such a variety of different users that some of them dealt with hackers from China and could ultimately prove that Chinese hackers are associated with the military of China. In addition, several Twitter accounts were hacked recently. The hacked accounts ranged from Burger King’s account to Jeep’s account. The Burger King hack insinuated McDonalds bought Burger King and the Jeep hack dealt with Jeep writing about competitors' vehicles. Also, “Anonymous” had their Twitter account hacked by another “hacktivist” organization. This competitor is named “Rustle League.” “Rustle League” is an organization not as well known as “Anonymous.”

Analysis:

These recent hacks convey how vulnerable websites are. The password settings do not help the situation. Websites like Twitter have certain requirements for how a password should be created. “Anonymous,” like the other organizations with Twitter accounts, most likely did not create a powerful password or used passwords it used previously. It is important to create passwords that are unique, long, and hard to guess. For example, passwords like, “correct horse battery staple,” are difficult to figure out. “Correct horse battery staple” is a unique phrase that is both long and hard to guess. In addition, password hacking software makes changing passwords regularly a crucial part of owning an account. Also, websites need to remove the password requirements that make passwords hard to remember. Websites should encourage phrases. When creating a password, research passwords that are regularly used and make sure to not use them. An alternative would be creating a password that is eight or more "characters long." Some of the "characters" should be capitalized and some should be lower case. Having the capital letters at the beginning of the password is predictable. Therefore, passwords should have capital letters either in the middle or at the end of the password. Numbers should also be placed either in the middle or at the beginning of the password. Also, punctuation marks and signs should be used in the password, either in the beginning or middle of the password. Due to the possibility of forgetting the password with different characters, the users should use password managers. For example, Roboform and 1Password are both useful password managers. This would help prevent users from either using files or sticky notes to remember the passwords. In addition, password managers allow users to make passwords that are extremely hard to “crack,” without the worry of forgetting the passwords.